Go Back > News > RSS Newsfeeds > Categories

User login

Frontpage Sponsor


As a Customer What would do to keep your ERP Implementation intact
Proactively define Business Process-- Take the Project Ownership
Handover everything to System Integrator from drawing BP till implementation of ERP
Hire more inhouse skilled & capable IT Resource to work directly with SI
Rely on SI Architects/Consultants
Total votes: 2

Baanboard at LinkedIn

Reference Content


Analyzing an HTA file, (Sat, Feb 3rd)

SANS Internet Storm Center - February 4, 2018 - 12:37am
I received an Invoice.MHT file attached to an email:
Categories: Security

Simple but Effective Malicious XLS Sheet, (Fri, Feb 2nd)

SANS Internet Storm Center - February 2, 2018 - 10:26am
Here is another quick analysis of a malicious Excel sheet found while hunting. The malicious document was delivered through a classic phishing attempt from Jane’s 360[1], a website operated by HIS Markit[2]. Here is a copy of the mail body:
Categories: Security

Adobe Flash 0-Day Used Against South Korean Targets, (Thu, Feb 1st)

SANS Internet Storm Center - February 1, 2018 - 9:16pm
the Koren CERT announced that it is aware of a so far unpatched Adobe Flash vulnerability that is being exploited in targeted attacks [1]. All versions of Adobe Flash Player including are vulnerable. was released in January as part of Adobe's normal patch Tuesday. Adobe has not yet released an advisory, and the only confirmation so far is a twitter post from a Korean security researcher [2]. [See update below about Adobe's advisory]
Categories: Security

Adaptive Phishing Kit, (Thu, Feb 1st)

SANS Internet Storm Center - February 1, 2018 - 8:26am
Phishing kits are everywhere! If your server is compromised today, they are chances that it will be used to mine cryptocurrency, to deliver malware payloads or to host a phishing kit. Phishing remains a common attack scenario to collect valid credentials and impersonate the user account or, in larger attacks, it is one of the first steps to compromise the final target. Phishing kits are usually mimicking well-known big Internet players (eBay, Paypal, Amazon, Google, Apple, Microsoft…[add your preferred one here]). I found an interesting phishing kit which adapts itself to the victim. Well, more precisely, it adapts to the victim email address.
Categories: Security

Cisco ASA WebVPN Vulnerability, (Tue, Jan 30th)

SANS Internet Storm Center - January 31, 2018 - 4:35pm
Before I get too many "I'm surprised/disappointed you haven't mentioned..." emails let's get out a rough draft on CVE-2018-0101.
Categories: Security

Tax Phishing Time, (Wed, Jan 31st)

SANS Internet Storm Center - January 31, 2018 - 2:13pm
Its that time of the year where you will start receiving fake tax information emails. So far today we have seen just a small campaign,  but I think people will more likely be susceptible to this kind of email this year as most people have heard about changes to the tax code, but not sure what has changed and how it affects them.  
Categories: Security

Using FLIR in Incident Response?, (Tue, Jan 30th)

SANS Internet Storm Center - January 30, 2018 - 9:11pm
Take a look at a few lines...
Categories: Security

Comment your Packet Captures - Extra!, (Mon, Jan 29th)

SANS Internet Storm Center - January 29, 2018 - 8:29am
Xavier has an excellent tip for Wireshark users: Comment your Packet Captures!
Categories: Security

Is this a pentest?, (Sun, Jan 28th)

SANS Internet Storm Center - January 28, 2018 - 10:25pm
Sometimes, when I'm analyzing malware, I think: this is probably part of a penetration test.
Categories: Security

Investigating Microsoft BITS Activity, (Fri, Jan 26th)

SANS Internet Storm Center - January 26, 2018 - 9:32am
Microsoft BITS (“Background Intelligent Transfer Service”) is a tool present[1] in all modern Microsoft Windows operating systems. As the name says, you can see it as a "curl" or "wget" tool for Windows. It helps to transfer files between a server and a client but it also has plenty of interesting features. Such a tool, being always available, is priceless for attackers. They started to use BITS to grab malicious contents from the Internet. In May 2016, I wrote a diary about a piece of malware that already used BITS[2]. But the tool has many more interesting features (for the good as well the bad guys) like executing a command once the download completed, it can also control the bandwidth used (to remain stealthy).
Categories: Security

Ransomware as a Service, (Thu, Jan 25th)

SANS Internet Storm Center - January 25, 2018 - 8:19am
Hunting on the dark web is interesting to find new malicious activities running in the background. Besides the classic sites where you can order drugs and all kind of counterfeited material, I discovered an interesting website which offers a service to create your own ransomware! The process is straightforward, you just have to:
Categories: Security

All times are GMT +2. The time now is 20:27.

©2001-2018 - -